header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Socusoft Photo 2 Video Converter v8.0.0 Local Buffer Overflow (Free and Professional variants)

Socusoft's Photo 2 Video Converter v8.0.0 (Free and Professional variants) contains a local buffer overflow condition in the pdmlog.dll library. Exploitation can result in register rewrites to control program execution flow, therefore, resulting in the ability to execute arbitrary shellcode leading to complete system compromise.

Gigs 1.2.1 (activateuser.php) Local File Inclusion Vulnerability

The vulnerability allows an attacker to include files from the local file system by manipulating the 'language' parameter in the activateuser.php script. By specifying a relative path to the '/etc/passwd' file, an attacker can read sensitive information such as usernames and hashed passwords.

FLIR Systems FLIR Thermal Camera FC-S/PT Authenticated OS Command Injection

FLIR FC-S/PT series suffer from an authenticated OS command injection vulnerability. This can be exploited to inject and execute arbitrary shell commands as the root user.

Easy DVD Creator 2.5.11 – Buffer Overflow (Windows 10 64bit, SEH)

The Easy DVD Creator version 2.5.11 is vulnerable to a buffer overflow vulnerability. This can be exploited on Windows 10 64bit systems using SEH overwrite technique. The vulnerability occurs when processing user input for the 'Enter User Name' field during registration. By providing a specially crafted input, an attacker can overflow the buffer and gain control of the SEH (Structured Exception Handler), allowing the execution of arbitrary code.

VICIdial user_authorization Unauthenticated Command Execution

This module exploits a vulnerability in VICIdial versions 2.9 RC 1 to 2.13 RC1 which allows unauthenticated users to execute arbitrary operating system commands as the web server user if password encryption is enabled (disabled by default). When password encryption is enabled the user's password supplied using HTTP basic authentication is used in a call to exec(). This module has been tested successfully on version 2.11 RC2 and 2.13 RC1 on CentOS.

Razer Synapse rzpnk.sys ZwOpenProcess

A vulnerability exists in the latest version of Razer Synapse (v2.20.15.1104 as of the day of disclosure) which can be leveraged locally by a malicious application to elevate its privileges to those of NT_AUTHORITYSYSTEM. The vulnerability lies in a specific IOCTL handler in the rzpnk.sys driver that passes a PID specified by the user to ZwOpenProcess. This can be issued by an application to open a handle to an arbitrary process with the necessary privileges to allocate, read and write memory in the specified process. This exploit leverages this vulnerability to open a handle to the winlogon process (which runs as NT_AUTHORITYSYSTEM) and infect it by installing a hook to execute attacker controlled shellcode. This hook is then triggered on demand by calling user32!LockWorkStation(), resulting in the attacker's payload being executed with the privileges of the infected winlogon process. In order for the issued IOCTL to work, the RazerIngameEngine.exe process must not be running. This exploit will check if it is, and attempt to kill it as necessary. The vulnerable software can be found here: https://www.razerzone.com/synapse/. No Razer hardware needs to be connected in order to leverage this vulnerability.

Recent Exploits: